英语人>网络例句>authenticated 相关的网络例句
authenticated相关的网络例句

查询词典 authenticated

与 authenticated 相关的网络例句 [注:此内容来源于网络,仅供参考]

The authenticated identifying consigner based mechanism was advanced. The protection for personal privacy was also established.

补充了身份认证委托证明人机制,实现了个人隐私的保护。

So the message is authenticated both in terms of source and in terms of data integrity.

因此,该消息认证无论是在源头上和数据的完整性方面。"/页"

The maximum data transfer rate permitted, in bytes per second, for local authenticated users.

允许的最大数据传输速率,单位为每秒钟多少bytes,用于限制本地授权用户。

Office Mode also provides enhanced anti-spoofing by ensuring that the IP address encountered by the gateway is authenticated and assigned to the user.

Office 模式也提供了反地址欺骗,确保网关遇到的 IP 地址是授权和指派给用户的。

If authenticated, the preserved frog would be the first of its kind found in Mexico, according to David Grimaldi, a biologist and curator at the American Museum of Natural History who was not involved in the find.

根据美国自然历史博物馆生物学家同时也是馆长David Grimaldi说,如果被证实,那么这将是首次在墨西哥发现的该种类青蛙。

The client computer receives the information from KDC and runs the user.s password through a one-way hashing function, which converts the password into the user.s KA. The client computer now has a session key and a TGT so that it can securely communicate with the KDC. The client is now authenticated

客户机受到了KDC的信息,然后通过单向的hash算法将用户密码转换成user's KA,现在客户计算机拥有了一个会话key和一个TGT,使得其可以和KDC安全通讯,现在客户通过了域验证,并且准备访问域内的资源。

In the new protocol, used Weil pairing technology, based on hyperelliptic curves, in digital signature authentication, and first authenticated the responder.

新的协议采用基于超椭圆曲线的Weil对技术进行数字签名认证,并且首先认证响应方身份。

Moreover, TSPA scheme possesses mutual authentication security attribute, and is capable of establishing secure tunnels between mutually authenticated clients and servers to protect subsequent service access authorization intermediately followed.

TSPA的另一个鲜明特点是具有对客户端和服务端的双向认证功能,并能在认证的客户端和服务端之间构建一条加密的安全隧道,用于保护认证后的访问授权等操作。

According to the authenticated tradition of the Prophet, travel for the sake of worship is undertaken to only three mosques; the Sacred Mosque in Makkah, the Prophet's Mosque in Madinah, and the Furthest Mosque in Jerusalem.

根据先知们约定俗成的传统,来到这儿膜拜的人只去三个清真寺:麦加的神之清真寺、知者之清真寺与耶路撒冷的最遥远之清真寺。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure. Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis ofOCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

第2/10页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.

在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。

In fact,I've got him on the satellite mobile right now.

实际上 我们已接通卫星可视电话了

The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.

世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。